React2Shell (CVE-2025–55182) — From React Server Components to Full RCE
React2Shell(CVE-2025-55182)是一种未认证的不安全反序列化漏洞,影响React服务器组件及Next.js等框架。攻击者可通过Flight协议实现可靠的远程代码执行。该漏洞CVSS评分为10.0,极具破坏性。GitHub提供相关Payload、HTTP请求及检测规则。 2026-1-12 13:24:27 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

React2Shell CVE-2025–55182: unauthenticated unsafe deserialization in React Server Components leading to reliable remote code execution via the Flight protocol.

Aditya Bhatt

🔗 All exploit payloads, HTTP requests, and detection rules referenced in this article are archived on GitHub:
👉
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

Lab: https://tryhackme.com/room/react2shellcve202555182
Difficulty: Intermediate → Advanced
Category: Web Exploitation | Deserialization | RCE
Free Article Link

Press enter or click to view image in full size

🧩 Task 1: Introduction — Why React2Shell Is a Big Deal

CVE-2025–55182, nicknamed React2Shell, is one of those vulnerabilities that instantly makes defenders nervous 😬. Discovered in December 2025, it carries a CVSS score of 10.0, which already tells you this isn’t some edge-case bug.

At its core, this vulnerability affects React Server Components (RSC) and frameworks built on top of them — most notably Next.js. The scary part?


文章来源: https://infosecwriteups.com/react2shell-cve-2025-55182-from-react-server-components-to-full-rce-81acd9f94783?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh